Bug 1200345 - (CVE-2022-29404) VUL-0: CVE-2022-29404: apache2: Denial of service in mod_lua r:parsebody
(CVE-2022-29404)
VUL-0: CVE-2022-29404: apache2: Denial of service in mod_lua r:parsebody
Status: RESOLVED FIXED
Classification: Novell Products
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents
unspecified
Other Other
: P3 - Medium : Normal
: ---
Assigned To: Security Team bot
Security Team bot
https://smash.suse.de/issue/333900/
CVSSv3.1:SUSE:CVE-2022-29404:5.9:(AV:...
:
Depends on:
Blocks:
  Show dependency treegraph
 
Reported: 2022-06-08 14:33 UTC by Carlos López
Modified: 2022-09-16 13:03 UTC (History)
2 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Carlos López 2022-06-08 14:33:56 UTC
CVE-2022-29404

Posted by Stefan Eissing on Jun 08Severity: low

Description:

In Apache HTTP Server 2.4.53 and earlier, a malicious request to a lua script that calls r:parsebody(0) may cause a 
denial of service due to no default limit on possible input size.

Credit:

The Apache HTTP Server project would like to thank Ronald Crane (Zippenhop LLC) for reporting this issue

References:

https://httpd.apache.org/security/vulnerabilities_24.html

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-29404
https://seclists.org/oss-sec/2022/q2/183
Comment 1 Carlos López 2022-06-08 14:36:11 UTC
The fix seems to be this one:
https://github.com/apache/httpd/commit/0c2910f07458179254e0127aa64f2d057c15d110

If so, the following are affected (no mod_lua in SLE-11-SP1):
 - SUSE:SLE-12-SP2:Update
 - SUSE:SLE-12-SP5:Update
 - SUSE:SLE-15:Update
 - SUSE:SLE-15-SP2:Update
 - SUSE:SLE-15-SP4:Update
 - openSUSE:Factory
Comment 3 Swamp Workflow Management 2022-06-16 16:16:56 UTC
SUSE-SU-2022:2099-1: An update that fixes 7 vulnerabilities is now available.

Category: security (important)
Bug References: 1200338,1200340,1200341,1200345,1200348,1200350,1200352
CVE References: CVE-2022-26377,CVE-2022-28614,CVE-2022-28615,CVE-2022-29404,CVE-2022-30522,CVE-2022-30556,CVE-2022-31813
JIRA References: 
Sources used:
SUSE OpenStack Cloud Crowbar 9 (src):    apache2-2.4.23-29.91.1
SUSE OpenStack Cloud Crowbar 8 (src):    apache2-2.4.23-29.91.1
SUSE OpenStack Cloud 9 (src):    apache2-2.4.23-29.91.1
SUSE OpenStack Cloud 8 (src):    apache2-2.4.23-29.91.1
SUSE Linux Enterprise Server for SAP 12-SP4 (src):    apache2-2.4.23-29.91.1
SUSE Linux Enterprise Server for SAP 12-SP3 (src):    apache2-2.4.23-29.91.1
SUSE Linux Enterprise Server 12-SP4-LTSS (src):    apache2-2.4.23-29.91.1
SUSE Linux Enterprise Server 12-SP3-LTSS (src):    apache2-2.4.23-29.91.1
SUSE Linux Enterprise Server 12-SP3-BCL (src):    apache2-2.4.23-29.91.1
SUSE Linux Enterprise Server 12-SP2-BCL (src):    apache2-2.4.23-29.91.1
HPE Helion Openstack 8 (src):    apache2-2.4.23-29.91.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 4 Swamp Workflow Management 2022-06-16 16:18:04 UTC
SUSE-SU-2022:2101-1: An update that fixes 7 vulnerabilities is now available.

Category: security (important)
Bug References: 1200338,1200340,1200341,1200345,1200348,1200350,1200352
CVE References: CVE-2022-26377,CVE-2022-28614,CVE-2022-28615,CVE-2022-29404,CVE-2022-30522,CVE-2022-30556,CVE-2022-31813
JIRA References: 
Sources used:
SUSE Linux Enterprise Software Development Kit 12-SP5 (src):    apache2-2.4.51-35.19.1
SUSE Linux Enterprise Server 12-SP5 (src):    apache2-2.4.51-35.19.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 5 David Anes 2022-06-17 13:30:03 UTC
All done. Assigning back to security.
Comment 6 Swamp Workflow Management 2022-07-06 16:24:32 UTC
SUSE-SU-2022:2302-1: An update that solves 7 vulnerabilities and has one errata is now available.

Category: security (important)
Bug References: 1198913,1200338,1200340,1200341,1200345,1200348,1200350,1200352
CVE References: CVE-2022-26377,CVE-2022-28614,CVE-2022-28615,CVE-2022-29404,CVE-2022-30522,CVE-2022-30556,CVE-2022-31813
JIRA References: 
Sources used:
openSUSE Leap 15.4 (src):    apache2-2.4.51-150400.6.3.1
SUSE Linux Enterprise Module for Server Applications 15-SP4 (src):    apache2-2.4.51-150400.6.3.1
SUSE Linux Enterprise Module for Packagehub Subpackages 15-SP4 (src):    apache2-2.4.51-150400.6.3.1
SUSE Linux Enterprise Module for Basesystem 15-SP4 (src):    apache2-2.4.51-150400.6.3.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 7 Swamp Workflow Management 2022-07-08 19:18:12 UTC
SUSE-SU-2022:2338-1: An update that fixes 7 vulnerabilities is now available.

Category: security (important)
Bug References: 1200338,1200340,1200341,1200345,1200348,1200350,1200352
CVE References: CVE-2022-26377,CVE-2022-28614,CVE-2022-28615,CVE-2022-29404,CVE-2022-30522,CVE-2022-30556,CVE-2022-31813
JIRA References: 
Sources used:
SUSE Linux Enterprise Server for SAP 15-SP1 (src):    apache2-2.4.33-150000.3.69.1
SUSE Linux Enterprise Server for SAP 15 (src):    apache2-2.4.33-150000.3.69.1
SUSE Linux Enterprise Server 15-SP1-LTSS (src):    apache2-2.4.33-150000.3.69.1
SUSE Linux Enterprise Server 15-SP1-BCL (src):    apache2-2.4.33-150000.3.69.1
SUSE Linux Enterprise Server 15-LTSS (src):    apache2-2.4.33-150000.3.69.1
SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS (src):    apache2-2.4.33-150000.3.69.1
SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS (src):    apache2-2.4.33-150000.3.69.1
SUSE Linux Enterprise High Performance Computing 15-LTSS (src):    apache2-2.4.33-150000.3.69.1
SUSE Linux Enterprise High Performance Computing 15-ESPOS (src):    apache2-2.4.33-150000.3.69.1
SUSE Enterprise Storage 6 (src):    apache2-2.4.33-150000.3.69.1
SUSE CaaS Platform 4.0 (src):    apache2-2.4.33-150000.3.69.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 8 Swamp Workflow Management 2022-07-08 19:19:36 UTC
SUSE-SU-2022:2342-1: An update that fixes 7 vulnerabilities is now available.

Category: security (important)
Bug References: 1200338,1200340,1200341,1200345,1200348,1200350,1200352
CVE References: CVE-2022-26377,CVE-2022-28614,CVE-2022-28615,CVE-2022-29404,CVE-2022-30522,CVE-2022-30556,CVE-2022-31813
JIRA References: 
Sources used:
openSUSE Leap 15.3 (src):    apache2-2.4.51-150200.3.48.1
SUSE Manager Server 4.1 (src):    apache2-2.4.51-150200.3.48.1
SUSE Manager Retail Branch Server 4.1 (src):    apache2-2.4.51-150200.3.48.1
SUSE Manager Proxy 4.1 (src):    apache2-2.4.51-150200.3.48.1
SUSE Linux Enterprise Server for SAP 15-SP2 (src):    apache2-2.4.51-150200.3.48.1
SUSE Linux Enterprise Server 15-SP2-LTSS (src):    apache2-2.4.51-150200.3.48.1
SUSE Linux Enterprise Server 15-SP2-BCL (src):    apache2-2.4.51-150200.3.48.1
SUSE Linux Enterprise Module for Server Applications 15-SP3 (src):    apache2-2.4.51-150200.3.48.1
SUSE Linux Enterprise Module for Packagehub Subpackages 15-SP3 (src):    apache2-2.4.51-150200.3.48.1
SUSE Linux Enterprise Module for Basesystem 15-SP3 (src):    apache2-2.4.51-150200.3.48.1
SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS (src):    apache2-2.4.51-150200.3.48.1
SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS (src):    apache2-2.4.51-150200.3.48.1
SUSE Enterprise Storage 7 (src):    apache2-2.4.51-150200.3.48.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 9 Carlos López 2022-09-16 13:03:38 UTC
Done, closing.